PSI specializes in providing integrated, multi-disciplinary security services to Government and commercial clients. PSI has participated in the development and validation of Continuity of Operations Plans (COOP) for various government agencies. PSI is widely recognized for comprehensive protection programs that integrate physical, technical, information, operations, personnel, computer, and communications security disciplines. In planning, implementing, or evaluating protection programs, PSI uses threat and vulnerability modeling methodologies, cost-benefit analysis, and other risk management tools to optimize cost effectiveness. PSI has extensive experience in developing threat models for physical and cyber terrorist threats, terrorists using weapons of mass destruction, technical attacks, and operations security (OPSEC) vulnerability assessments. PSI personnel have developed, assisted in and assessed large scale, multi-agency emergency management exercises. These exercises have included scenarios involving weapons of mass destruction in forms ranging from improvised explosive radiological devices to full scale nuclear attacks.
PSI also provides technical security services as a part of an integrated information assurance program. This includes identification and characterization of methods of compromising infrastructure system components and identifying successful attacks. As part of this activity, PSI is responsible for identifying vulnerabilities and attack signatures.
PSI offers an exceptional "adversary perspective", which is unique and complements the traditional protection program methodologies. Historically, security planners identify what constitutes their "core assets" and then design security in layers outward from those assets. PSI's Credible Adversary Specialists identify targets that are the most attractive to a variety of diverse adversary sets, establish potential adversary paths and penetration techniques likeliest to be used, and outline security measures and actions that will reduce or eliminate the risk of adversary success to acceptable limits. This "outside the box" approach is not designed to replace traditional security planning; but provides an additional tool that can be utilized to increase the success of the overall protection program planning effort. PSI staff has successfully applied this technique in overseas security risk assessments for government and commercial industries, airport and nuclear facility vulnerability assessments, security systems requirements assessments, "live" adversary penetration-of-systems performance tests, and in "tabletop" scenarios.
In addition to conducting classes at client facilities, PSI meets the needs of security by providing on-site tailored instruction. PSI reduces many intrinsic expenses by offering quality instruction via our "mobile training team concept". PSI provides subject matter experts with backgrounds specific to the desired topics of instruction, develops the course curriculum to the client's expectations, and delivers the course of instruction at a client specified location. PSI has used this methodology to develop and provide specialized educational services designed to fit various needs, and to assist the individual office with career enhancement and professional skills development.
PSI supports the Department of Health & Human Services in meeting HSPD-12 (Policy for a Common Identification Standard for Federal Employees and Contractors) requirements for many of the agencies under the umbrella of HHS. Federal Information Processing Standard 201, Personnel Identification Verification (PIV), provides the minimum requirements needed to meet the control and security objectives of HSPD-12, including the process to prove an individual's identity, also referred to as identity proofing. The National Agency Check with Written Inquiries (NACI) is the OPM's required process for applicants requiring agency-issued IDs. PSI's trained Personnel Security Specialists process and review preliminary background investigation requests and required documents for government applicants and contractor personnel, and assist with fingerprinting applicants as part of the identity proofing security process. – less–ZoomInfo